All Data Structures Files Functions Variables Typedefs Enumerations Enumerator Friends Macros Groups Pages
as_config.h
Go to the documentation of this file.
1 /*
2  * Copyright 2008-2017 Aerospike, Inc.
3  *
4  * Portions may be licensed to Aerospike, Inc. under one or more contributor
5  * license agreements.
6  *
7  * Licensed under the Apache License, Version 2.0 (the "License"); you may not
8  * use this file except in compliance with the License. You may obtain a copy of
9  * the License at http://www.apache.org/licenses/LICENSE-2.0
10  *
11  * Unless required by applicable law or agreed to in writing, software
12  * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
13  * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
14  * License for the specific language governing permissions and limitations under
15  * the License.
16  */
17 #pragma once
18 
19 #include <aerospike/as_error.h>
20 #include <aerospike/as_host.h>
21 #include <aerospike/as_policy.h>
22 #include <aerospike/as_password.h>
23 #include <aerospike/as_vector.h>
24 
25 #ifdef __cplusplus
26 extern "C" {
27 #endif
28 
29 /******************************************************************************
30  * MACROS
31  *****************************************************************************/
32 
33 #ifdef __linux__
34 /**
35  * Default path to the system UDF files.
36  */
37 #define AS_CONFIG_LUA_SYSTEM_PATH "/opt/aerospike/client/sys/udf/lua"
38 
39 /**
40  * Default path to the user UDF files.
41  */
42 #define AS_CONFIG_LUA_USER_PATH "/opt/aerospike/client/usr/udf/lua"
43 #endif
44 
45 #ifdef __APPLE__
46 /**
47  * Default path to the system UDF files.
48  */
49 #define AS_CONFIG_LUA_SYSTEM_PATH "/usr/local/aerospike/client/sys/udf/lua"
50 
51 /**
52  * Default path to the user UDF files.
53  */
54 #define AS_CONFIG_LUA_USER_PATH "/usr/local/aerospike/client/usr/udf/lua"
55 #endif
56 
57 /**
58  * The size of path strings
59  */
60 #define AS_CONFIG_PATH_MAX_SIZE 256
61 
62 /**
63  * The maximum string length of path strings
64  */
65 #define AS_CONFIG_PATH_MAX_LEN (AS_CONFIG_PATH_MAX_SIZE - 1)
66 
67 /******************************************************************************
68  * TYPES
69  *****************************************************************************/
70 
71 /**
72  * IP translation table.
73  *
74  * @ingroup as_config_object
75  */
76 typedef struct as_addr_map_s {
77 
78  /**
79  * Original hostname or IP address in string format.
80  */
81  char* orig;
82 
83  /**
84  * Use this IP address instead.
85  */
86  char* alt;
87 
88 } as_addr_map;
89 
90 /**
91  * lua module config
92  *
93  * @ingroup as_config_object
94  */
95 typedef struct as_config_lua_s {
96 
97  /**
98  * Enable caching of UDF files in the client
99  * application.
100  */
102 
103  /**
104  * The path to the system UDF files. These UDF files
105  * are installed with the aerospike client library.
106  * Default location defined in: AS_CONFIG_LUA_SYSTEM_PATH
107  */
108  char system_path[AS_CONFIG_PATH_MAX_SIZE];
109 
110  /**
111  * The path to user's UDF files.
112  * Default location defined in: AS_CONFIG_LUA_USER_PATH
113  */
114  char user_path[AS_CONFIG_PATH_MAX_SIZE];
115 
116 } as_config_lua;
117 
118 /**
119  * TLS module config
120  *
121  * @ingroup as_config_object
122  */
123 typedef struct as_config_tls_s {
124 
125  /**
126  * Enable TLS on connections.
127  * By default TLS is disabled.
128  */
129  bool enable;
130 
131  /**
132  * Only encrypt connections; do not verify certificates.
133  * By default TLS will verify certificates.
134  */
136 
137  /**
138  * Path to a trusted CA certificate file.
139  * By default TLS will use system standard trusted CA certificates.
140  * Use as_config_tls_set_cafile() to set this field.
141  */
142  char* cafile;
143 
144  /**
145  * Path to a directory of trusted certificates.
146  * See the OpenSSL SSL_CTX_load_verify_locations manual page for
147  * more information about the format of the directory.
148  * Use as_config_tls_set_capath() to set this field.
149  */
150  char* capath;
151 
152  /**
153  * Specifies enabled protocols.
154  *
155  * This format is the same as Apache's SSLProtocol documented
156  * at https://httpd.apache.org/docs/current/mod/mod_ssl.html#sslprotocol
157  *
158  * If not specified (NULL) the client will use "-all +TLSv1.2".
159  *
160  * If you are not sure what protocols to select this option is
161  * best left unspecified (NULL).
162  *
163  * Use as_config_tls_set_protocols() to set this field.
164  */
165  char* protocols;
166 
167  /**
168  * Specifies enabled cipher suites.
169  *
170  * The format is the same as OpenSSL's Cipher List Format documented
171  * at https://www.openssl.org/docs/manmaster/apps/ciphers.html
172  *
173  * If not specified the OpenSSL default cipher suite described in
174  * the ciphers documentation will be used.
175  *
176  * If you are not sure what cipher suite to select this option
177  * is best left unspecified (NULL).
178  *
179  * Use as_config_tls_set_cipher_suite() to set this field.
180  */
182 
183  /**
184  * Enable CRL checking for the certificate chain leaf certificate.
185  * An error occurs if a suitable CRL cannot be found.
186  * By default CRL checking is disabled.
187  */
188  bool crl_check;
189 
190  /**
191  * Enable CRL checking for the entire certificate chain.
192  * An error occurs if a suitable CRL cannot be found.
193  * By default CRL checking is disabled.
194  */
196 
197  /**
198  * Path to a certificate blacklist file.
199  * The file should contain one line for each blacklisted certificate.
200  * Each line starts with the certificate serial number expressed in hex.
201  * Each entry may optionally specify the issuer name of the
202  * certificate (serial numbers are only required to be unique per
203  * issuer). Example records:
204  * 867EC87482B2 /C=US/ST=CA/O=Acme/OU=Engineering/CN=Test Chain CA
205  * E2D4B0E570F9EF8E885C065899886461
206  *
207  * Use as_config_tls_set_cert_blacklist() to set this field.
208  */
210 
211  /**
212  * Log session information for each connection.
213  */
215 
216  /**
217  * Path to the client's key for mutual authentication.
218  * By default mutual authentication is disabled.
219  *
220  * Use as_config_tls_set_keyfile() to set this field.
221  */
222  char* keyfile;
223 
224  /**
225  * Path to the client's certificate chain file for mutual authentication.
226  * By default mutual authentication is disabled.
227  *
228  * Use as_config_tls_set_certfile() to set this field.
229  */
230  char* certfile;
231 
232  /**
233  * Maximum socket idle in seconds for TLS connections. TLS Socket connection pools will
234  * discard sockets that have been idle longer than the maximum. The value is limited to
235  * 24 hours (86400).
236  *
237  * It's important to set this value to a few seconds less than the server's proto-fd-idle-ms
238  * (default 60000 milliseconds or 1 minute), so the client does not attempt to use a socket
239  * that has already been reaped by the server.
240  *
241  * Default: 55 seconds
242  */
243  uint32_t max_socket_idle;
244 
245 } as_config_tls;
246 
247 /**
248  * The `as_config` contains the settings for the `aerospike` client. Including
249  * default policies, seed hosts in the cluster and other settings.
250  *
251  * ## Initialization
252  *
253  * Before using as_config, you must first initialize it. This will setup the
254  * default values.
255  *
256  * ~~~~~~~~~~{.c}
257  * as_config config;
258  * as_config_init(&config);
259  * ~~~~~~~~~~
260  *
261  * Once initialized, you can populate the values.
262  *
263  * ## Seed Hosts
264  *
265  * The client will require at least one seed host defined in the
266  * configuration. The seed host is defined in `as_config.hosts`.
267  *
268  * ~~~~~~~~~~{.c}
269  * as_config_add_host(&config, "127.0.0.1", 3000);
270  * ~~~~~~~~~~
271  *
272  * The client will iterate over the list until it connects with one of the hosts.
273  *
274  * ## Policies
275  *
276  * The configuration also defines default policies for the application. The
277  * `as_config_init()` function already presets default values for the policies.
278  *
279  * Policies define the behavior of the client, which can be global across
280  * operations, global to a single operation, or local to a single use of an
281  * operation.
282  *
283  * Each database operation accepts a policy for that operation as an a argument.
284  * This is considered a local policy, and is a single use policy. This policy
285  * supersedes any global policy defined.
286  *
287  * If a value of the policy is not defined, then the rule is to fallback to the
288  * global policy for that operation. If the global policy for that operation is
289  * undefined, then the global default value will be used.
290  *
291  * If you find that you have behavior that you want every use of an operation
292  * to utilize, then you can specify the default policy in as_config.policies.
293  *
294  * For example, the `aerospike_key_put()` operation takes an `as_policy_write`
295  * policy. If you find yourself setting the `key` policy value for every call
296  * to `aerospike_key_put()`, then you may find it beneficial to set the global
297  * `as_policy_write` in `as_policies.write`, which all write operations will use.
298  *
299  * ~~~~~~~~~~{.c}
300  * config.policies.write.key = AS_POLICY_KEY_SEND;
301  * ~~~~~~~~~~
302  *
303  * If you find that you want to use a policy value across all operations, then
304  * you may find it beneficial to set the default policy value for that policy
305  * value.
306  *
307  * For example, if you keep setting the key policy value to
308  * `AS_POLICY_KEY_SEND`, then you may want to just set `as_policies.key`. This
309  * will set the global default value for the policy value. So, if an global
310  * operation policy or a local operation policy does not define a value, then
311  * this value will be used.
312  *
313  * ~~~~~~~~~~{.c}
314  * config.policies.key = AS_POLICY_KEY_SEND;
315  * ~~~~~~~~~~
316  *
317  * Global default policy values:
318  * - as_policies.timeout
319  * - as_policies.retry
320  * - as_policies.key
321  * - as_policies.gen
322  * - as_policies.exists
323  *
324  * Global operation policies:
325  * - as_policies.read
326  * - as_policies.write
327  * - as_policies.operate
328  * - as_policies.remove
329  * - as_policies.query
330  * - as_policies.scan
331  * - as_policies.info
332  *
333  *
334  * ## User-Defined Function Settings
335  *
336  * If you are using using user-defined functions (UDF) for processing query
337  * results (i.e aggregations), then you will find it useful to set the
338  * `mod_lua` settings. Of particular importance is the `mod_lua.user_path`,
339  * which allows you to define a path to where the client library will look for
340  * Lua files for processing.
341  *
342  * ~~~~~~~~~~{.c}
343  * strcpy(config.mod_lua.user_path, "/home/me/lua");
344  * ~~~~~~~~~~
345  *
346  * Never call as_config_destroy() directly because ownership of config fields
347  * is transferred to aerospike in aerospike_init() or aerospike_new().
348  *
349  * @ingroup client_objects
350  */
351 typedef struct as_config_s {
352  /**
353  * Seed hosts. Populate with one or more hosts in the cluster that you intend to connect with.
354  * Do not set directly. Use as_config_add_hosts() or as_config_add_host() to add seed hosts.
355  */
357 
358  /**
359  * User authentication to cluster. Leave empty for clusters running without restricted access.
360  */
361  char user[AS_USER_SIZE];
362 
363  /**
364  * Password authentication to cluster. The hashed value of password will be stored by the client
365  * and sent to server in same format. Leave empty for clusters running without restricted access.
366  */
367  char password[AS_PASSWORD_HASH_SIZE];
368 
369  /**
370  * Expected cluster name. If not null, server nodes must return this cluster name in order to
371  * join the client's view of the cluster. Should only be set when connecting to servers that
372  * support the "cluster-name" info command. Use as_config_set_cluster_name() to set this field.
373  * Default: NULL
374  */
376 
377  /**
378  * A IP translation table is used in cases where different clients use different server
379  * IP addresses. This may be necessary when using clients from both inside and outside
380  * a local area network. Default is no translation.
381  *
382  * The key is the IP address returned from friend info requests to other servers. The
383  * value is the real IP address used to connect to the server.
384  *
385  * A deep copy of ip_map is performed in aerospike_connect(). The caller is
386  * responsible for memory deallocation of the original data structure.
387  */
389 
390  /**
391  * Length of ip_map array.
392  * Default: 0
393  */
394  uint32_t ip_map_size;
395 
396  /**
397  * Maximum number of synchronous connections allowed per server node. Synchronous transactions
398  * will go through retry logic and potentially fail with error code "AEROSPIKE_ERR_NO_MORE_CONNECTIONS"
399  * if the maximum number of connections would be exceeded.
400  *
401  * The number of connections used per node depends on how many concurrent threads issue
402  * database commands plus sub-threads used for parallel multi-node commands (batch, scan,
403  * and query). One connection will be used for each thread.
404  *
405  * Default: 300
406  */
408 
409  /**
410  * Maximum number of asynchronous (non-pipeline) connections allowed for each node.
411  * This limit will be enforced at the node/event loop level. If the value is 100 and 2 event
412  * loops are created, then each node/event loop asynchronous (non-pipeline) connection pool
413  * will have a limit of 50. Async transactions will be rejected if the limit would be exceeded.
414  * This variable is ignored if asynchronous event loops are not created.
415  * Default: 300
416  */
418 
419  /**
420  * Maximum number of pipeline connections allowed for each node.
421  * This limit will be enforced at the node/event loop level. If the value is 100 and 2 event
422  * loops are created, then each node/event loop pipeline connection pool will have a limit of 50.
423  * Async transactions will be rejected if the limit would be exceeded.
424  * This variable is ignored if asynchronous event loops are not created.
425  * Default: 64
426  */
428 
429  /**
430  * Number of synchronous connection pools used for each node. Machines with 8 cpu cores or
431  * less usually need just one connection pool per node. Machines with a large number of cpu
432  * cores may have their synchronous performance limited by contention for pooled connections.
433  * Contention for pooled connections can be reduced by creating multiple mini connection pools
434  * per node.
435  *
436  * Default: 1
437  */
439 
440  /**
441  * Initial host connection timeout in milliseconds. The timeout when opening a connection
442  * to the server host for the first time.
443  * Default: 1000
444  */
445  uint32_t conn_timeout_ms;
446 
447  /**
448  * Polling interval in milliseconds for cluster tender
449  * Default: 1000
450  */
451  uint32_t tender_interval;
452 
453  /**
454  * Number of threads stored in underlying thread pool used by synchronous batch/scan/query commands.
455  * These commands are often sent to multiple server nodes in parallel threads. A thread pool
456  * improves performance because threads do not have to be created/destroyed for each command.
457  * Calculate your value using the following formula:
458  *
459  * thread_pool_size = (concurrent synchronous batch/scan/query commands) * (server nodes)
460  *
461  * If your application only uses async commands, this field can be set to zero.
462  * Default: 16
463  */
465 
466  /**
467  * Client policies
468  */
470 
471  /**
472  * lua config. This is a global config even though it's located here in cluster config.
473  * This config has been left here to avoid breaking the API.
474  *
475  * The global lua config will only be changed once on first cluster initialization.
476  * A better method for initializing lua configuration is to leave this field alone and
477  * instead call aerospike_init_lua():
478  *
479  * ~~~~~~~~~~{.c}
480  * // Get default global lua configuration.
481  * as_config_lua lua;
482  * as_config_lua_init(&lua);
483  *
484  * // Optionally modify lua defaults.
485  * lua.cache_enabled = <enable lua cache>;
486  * strcpy(lua.system_path, <lua system directory>);
487  * strcpy(lua.user_path, <lua user directory>);
488  *
489  * // Initialize global lua configuration.
490  * aerospike_init_lua(&lua);
491  * ~~~~~~~~~~
492  */
494 
495  /*
496  * TLS configuration parameters.
497  */
499 
500  /**
501  * Action to perform if client fails to connect to seed hosts.
502  *
503  * If fail_if_not_connected is true (default), the cluster creation will fail
504  * when all seed hosts are not reachable.
505  *
506  * If fail_if_not_connected is false, an empty cluster will be created and the
507  * client will automatically connect when Aerospike server becomes available.
508  */
510 
511  /**
512  * Flag to signify if "services-alternate" should be used instead of "services"
513  * Default : false
514  */
516 
517  /**
518  * Indicates if shared memory should be used for cluster tending. Shared memory
519  * is useful when operating in single threaded mode with multiple client processes.
520  * This model is used by wrapper languages such as PHP and Python. When enabled,
521  * the data partition maps are maintained by only one process and all other processes
522  * use these shared memory maps.
523  *
524  * Shared memory should not be enabled for multi-threaded programs.
525  * Default: false
526  */
527  bool use_shm;
528 
529  /**
530  * Shared memory identifier. This identifier should be the same for all applications
531  * that use the Aerospike C client.
532  * Default: 0xA6000000
533  */
534  int shm_key;
535 
536  /**
537  * Shared memory maximum number of server nodes allowed. This value is used to size
538  * the fixed shared memory segment. Leave a cushion between actual server node
539  * count and shm_max_nodes so new nodes can be added without having to reboot the client.
540  * Default: 16
541  */
542  uint32_t shm_max_nodes;
543 
544  /**
545  * Shared memory maximum number of namespaces allowed. This value is used to size
546  * the fixed shared memory segment. Leave a cushion between actual namespaces
547  * and shm_max_namespaces so new namespaces can be added without having to reboot the client.
548  * Default: 8
549  */
551 
552  /**
553  * Take over shared memory cluster tending if the cluster hasn't been tended by this
554  * threshold in seconds.
555  * Default: 30
556  */
558 } as_config;
559 
560 /******************************************************************************
561  * FUNCTIONS
562  *****************************************************************************/
563 
564 /**
565  * Initialize the configuration to default values.
566  *
567  * You should do this to ensure the configuration has valid values, before
568  * populating it with custom options.
569  *
570  * ~~~~~~~~~~{.c}
571  * as_config config;
572  * as_config_init(&config);
573  * as_config_add_host(&config, "127.0.0.1", 3000);
574  * ~~~~~~~~~~
575  *
576  * @relates as_config
577  */
578 as_config*
579 as_config_init(as_config* config);
580 
581 /**
582  * Add seed host(s) from a string with format: hostname1[:tlsname1][:port1],...
583  * Hostname may also be an IP address in the following formats.
584  *
585  * ~~~~~~~~~~{.c}
586  * IPv4: xxx.xxx.xxx.xxx
587  * IPv6: [xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx]
588  * IPv6: [xxxx::xxxx]
589  * ~~~~~~~~~~
590  *
591  * The host addresses will be copied.
592  * The caller is responsible for the original string.
593  *
594  * ~~~~~~~~~~{.c}
595  * as_config config;
596  * as_config_init(&config);
597  * as_config_add_hosts(&config, "host1,host2:3010,192.168.20.1:3020,[2001::1000]:3030", 3000);
598  * ~~~~~~~~~~
599  *
600  * @relates as_config
601  */
602 bool
603 as_config_add_hosts(as_config* config, const char* string, uint16_t default_port);
604 
605 /**
606  * Add host to seed the cluster.
607  * The host address will be copied.
608  * The caller is responsible for the original address string.
609  *
610  * ~~~~~~~~~~{.c}
611  * as_config config;
612  * as_config_init(&config);
613  * as_config_add_host(&config, "127.0.0.1", 3000);
614  * ~~~~~~~~~~
615  *
616  * @relates as_config
617  */
618 void
619 as_config_add_host(as_config* config, const char* address, uint16_t port);
620 
621 /**
622  * Remove all hosts.
623  *
624  * @relates as_config
625  */
626 void
628 
629 /**
630  * User authentication for servers with restricted access. The password will be stored by the
631  * client and sent to server in hashed format.
632  *
633  * ~~~~~~~~~~{.c}
634  * as_config config;
635  * as_config_init(&config);
636  * as_config_set_user(&config, "charlie", "mypassword");
637  * ~~~~~~~~~~
638  *
639  * @relates as_config
640  */
641 bool
642 as_config_set_user(as_config* config, const char* user, const char* password);
643 
644 /**
645  * Free existing string if not null and copy value to string.
646  */
647 void
648 as_config_set_string(char** str, const char* value);
649 
650 /**
651  * Set expected cluster name.
652  *
653  * @relates as_config
654  */
655 static inline void
656 as_config_set_cluster_name(as_config* config, const char* cluster_name)
657 {
658  as_config_set_string(&config->cluster_name, cluster_name);
659 }
660 
661 /**
662  * Initialize global lua configuration to defaults.
663  *
664  * @relates as_config
665  */
666 static inline void
668 {
669  lua->cache_enabled = false;
670  strcpy(lua->system_path, AS_CONFIG_LUA_SYSTEM_PATH);
671  strcpy(lua->user_path, AS_CONFIG_LUA_USER_PATH);
672 }
673 
674 /**
675  * Set TLS path to a trusted CA certificate file.
676  *
677  * @relates as_config
678  */
679 static inline void
680 as_config_tls_set_cafile(as_config* config, const char* cafile)
681 {
682  as_config_set_string(&config->tls.cafile, cafile);
683 }
684 
685 /**
686  * Set TLS path to a directory of trusted certificates.
687  *
688  * @relates as_config
689  */
690 static inline void
691 as_config_tls_set_capath(as_config* config, const char* capath)
692 {
693  as_config_set_string(&config->tls.capath, capath);
694 }
695 
696 /**
697  * Set TLS enabled protocols.
698  *
699  * @relates as_config
700  */
701 static inline void
702 as_config_tls_set_protocols(as_config* config, const char* protocols)
703 {
704  as_config_set_string(&config->tls.protocols, protocols);
705 }
706 
707 /**
708  * Set TLS enabled cipher suites.
709  *
710  * @relates as_config
711  */
712 static inline void
713 as_config_tls_set_cipher_suite(as_config* config, const char* cipher_suite)
714 {
715  as_config_set_string(&config->tls.cipher_suite, cipher_suite);
716 }
717 
718 /**
719  * Set TLS path to a certificate blacklist file.
720  *
721  * @relates as_config
722  */
723 static inline void
724 as_config_tls_set_cert_blacklist(as_config* config, const char* cert_blacklist)
725 {
726  as_config_set_string(&config->tls.cert_blacklist, cert_blacklist);
727 }
728 
729 /**
730  * Set TLS path to the client's key for mutual authentication.
731  *
732  * @relates as_config
733  */
734 static inline void
735 as_config_tls_set_keyfile(as_config* config, const char* keyfile)
736 {
737  as_config_set_string(&config->tls.keyfile, keyfile);
738 }
739 
740 /**
741  * Set TLS path to the client's certificate chain file for mutual authentication.
742  *
743  * @relates as_config
744  */
745 static inline void
746 as_config_tls_set_certfile(as_config* config, const char* certfile)
747 {
748  as_config_set_string(&config->tls.certfile, certfile);
749 }
750 
751 /**
752  * Add TLS host to seed the cluster.
753  * The host address and TLS name will be copied.
754  * The caller is responsible for the original address string.
755  *
756  * ~~~~~~~~~~{.c}
757  * as_config config;
758  * as_config_init(&config);
759  * as_config_tls_add_host(&config, "127.0.0.1", "node1.test.org", 3000);
760  * ~~~~~~~~~~
761  *
762  * @relates as_config
763  */
764 void
765 as_config_tls_add_host(as_config* config, const char* address, const char* tls_name, uint16_t port);
766 
767 #ifdef __cplusplus
768 } // end extern "C"
769 #endif
uint32_t tender_interval
Definition: as_config.h:451
bool use_services_alternate
Definition: as_config.h:515
uint32_t conn_timeout_ms
Definition: as_config.h:445
uint32_t shm_takeover_threshold_sec
Definition: as_config.h:557
#define AS_USER_SIZE
Definition: as_password.h:29
static void as_config_set_cluster_name(as_config *config, const char *cluster_name)
Definition: as_config.h:656
char * keyfile
Definition: as_config.h:222
bool as_config_set_user(as_config *config, const char *user, const char *password)
as_addr_map * ip_map
Definition: as_config.h:388
bool use_shm
Definition: as_config.h:527
bool fail_if_not_connected
Definition: as_config.h:509
char * cipher_suite
Definition: as_config.h:181
static void as_config_tls_set_protocols(as_config *config, const char *protocols)
Definition: as_config.h:702
int shm_key
Definition: as_config.h:534
as_config_lua lua
Definition: as_config.h:493
uint32_t shm_max_nodes
Definition: as_config.h:542
uint32_t thread_pool_size
Definition: as_config.h:464
uint32_t shm_max_namespaces
Definition: as_config.h:550
uint32_t conn_pools_per_node
Definition: as_config.h:438
bool as_config_add_hosts(as_config *config, const char *string, uint16_t default_port)
bool log_session_info
Definition: as_config.h:214
uint32_t ip_map_size
Definition: as_config.h:394
static void as_config_tls_set_certfile(as_config *config, const char *certfile)
Definition: as_config.h:746
static void as_config_tls_set_cert_blacklist(as_config *config, const char *cert_blacklist)
Definition: as_config.h:724
char * capath
Definition: as_config.h:150
char * cafile
Definition: as_config.h:142
char * protocols
Definition: as_config.h:165
char * cert_blacklist
Definition: as_config.h:209
as_config * as_config_init(as_config *config)
uint32_t pipe_max_conns_per_node
Definition: as_config.h:427
as_vector * hosts
Definition: as_config.h:356
as_policies policies
Definition: as_config.h:469
void as_config_add_host(as_config *config, const char *address, uint16_t port)
uint32_t max_conns_per_node
Definition: as_config.h:407
#define AS_CONFIG_PATH_MAX_SIZE
Definition: as_config.h:60
static void as_config_tls_set_cafile(as_config *config, const char *cafile)
Definition: as_config.h:680
as_config_tls tls
Definition: as_config.h:498
void as_config_set_string(char **str, const char *value)
bool crl_check
Definition: as_config.h:188
uint32_t max_socket_idle
Definition: as_config.h:243
void as_config_tls_add_host(as_config *config, const char *address, const char *tls_name, uint16_t port)
static void as_config_tls_set_capath(as_config *config, const char *capath)
Definition: as_config.h:691
bool cache_enabled
Definition: as_config.h:101
static void as_config_tls_set_cipher_suite(as_config *config, const char *cipher_suite)
Definition: as_config.h:713
static void as_config_tls_set_keyfile(as_config *config, const char *keyfile)
Definition: as_config.h:735
uint32_t async_max_conns_per_node
Definition: as_config.h:417
char * certfile
Definition: as_config.h:230
char system_path[AS_CONFIG_PATH_MAX_SIZE]
Definition: as_config.h:108
bool crl_check_all
Definition: as_config.h:195
static void as_config_lua_init(as_config_lua *lua)
Definition: as_config.h:667
bool encrypt_only
Definition: as_config.h:135
char user_path[AS_CONFIG_PATH_MAX_SIZE]
Definition: as_config.h:114
char * cluster_name
Definition: as_config.h:375
char * alt
Definition: as_config.h:86
#define AS_PASSWORD_HASH_SIZE
Definition: as_password.h:34
char * orig
Definition: as_config.h:81
void as_config_clear_hosts(as_config *config)